Analysis
-
max time kernel
206s -
max time network
205s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/04/2024, 09:24 UTC
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://api.getpxlemal.com?id=11541916&stepNo=1
Resource
win11-20240221-en
General
-
Target
https://api.getpxlemal.com?id=11541916&stepNo=1
Malware Config
Signatures
-
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File opened for modification C:\Windows\Logs\DISM\dism.log dismhost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133571282636764147" chrome.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000_Classes\Local Settings chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\download:Zone.Identifier chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3424 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3112 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2684 chrome.exe 2684 chrome.exe 248 chrome.exe 248 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2420 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2684 chrome.exe 2684 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe -
Suspicious use of SetWindowsHookEx 35 IoCs
pid Process 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 2420 OpenWith.exe 1544 OpenWith.exe 1420 OpenWith.exe 3112 POWERPNT.EXE 3112 POWERPNT.EXE 3112 POWERPNT.EXE 3112 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2684 wrote to memory of 4648 2684 chrome.exe 80 PID 2684 wrote to memory of 4648 2684 chrome.exe 80 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 4880 2684 chrome.exe 82 PID 2684 wrote to memory of 1452 2684 chrome.exe 83 PID 2684 wrote to memory of 1452 2684 chrome.exe 83 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 PID 2684 wrote to memory of 4704 2684 chrome.exe 84 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://api.getpxlemal.com?id=11541916&stepNo=11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xe0,0x104,0x108,0xb8,0x10c,0x7ffc4d709758,0x7ffc4d709768,0x7ffc4d7097782⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1540 --field-trial-handle=1812,i,10607418705779434098,4781281359446077480,131072 /prefetch:22⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1944 --field-trial-handle=1812,i,10607418705779434098,4781281359446077480,131072 /prefetch:82⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1812,i,10607418705779434098,4781281359446077480,131072 /prefetch:82⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3016 --field-trial-handle=1812,i,10607418705779434098,4781281359446077480,131072 /prefetch:12⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1812,i,10607418705779434098,4781281359446077480,131072 /prefetch:12⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1812,i,10607418705779434098,4781281359446077480,131072 /prefetch:82⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1812,i,10607418705779434098,4781281359446077480,131072 /prefetch:82⤵
- NTFS ADS
PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1812,i,10607418705779434098,4781281359446077480,131072 /prefetch:82⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4412 --field-trial-handle=1812,i,10607418705779434098,4781281359446077480,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:248
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2208
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3364
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2420
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1544
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1420
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\NewCompare.txt1⤵
- Opens file in notepad (likely ransom note)
PID:3424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:456
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:4724
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:3936
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\C56EEDC6-8D0B-4B61-99CB-EFCB671AE5E3\dismhost.exeC:\Users\Admin\AppData\Local\Temp\C56EEDC6-8D0B-4B61-99CB-EFCB671AE5E3\dismhost.exe {39058A14-BA7C-4125-8E93-BD043A5FDF22}1⤵
- Drops file in Windows directory
PID:4968
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /n "C:\Users\Admin\Desktop\UnlockSend.potm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3112
Network
-
Remote address:8.8.8.8:53Requestapi.getpxlemal.comIN AResponseapi.getpxlemal.comIN A172.67.185.224api.getpxlemal.comIN A104.21.48.115
-
Remote address:8.8.8.8:53Request224.185.67.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request43.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestctldl.windowsupdate.comIN AResponsectldl.windowsupdate.comIN CNAMEwu-bg-shim.trafficmanager.netwu-bg-shim.trafficmanager.netIN CNAMEdownload.windowsupdate.com.edgesuite.netdownload.windowsupdate.com.edgesuite.netIN CNAMEa767.dspw65.akamai.neta767.dspw65.akamai.netIN A2.17.197.241a767.dspw65.akamai.netIN A2.17.197.240
-
Remote address:8.8.8.8:53Requestr.bing.comIN AResponser.bing.comIN CNAMEp-static.bing.trafficmanager.netp-static.bing.trafficmanager.netIN CNAMEr.bing.com.edgekey.netr.bing.com.edgekey.netIN CNAMEe86303.dscx.akamaiedge.nete86303.dscx.akamaiedge.netIN A23.62.61.99e86303.dscx.akamaiedge.netIN A23.62.61.129e86303.dscx.akamaiedge.netIN A23.62.61.97e86303.dscx.akamaiedge.netIN A23.62.61.152e86303.dscx.akamaiedge.netIN A23.62.61.57e86303.dscx.akamaiedge.netIN A23.62.61.72e86303.dscx.akamaiedge.netIN A23.62.61.75e86303.dscx.akamaiedge.netIN A23.62.61.106e86303.dscx.akamaiedge.netIN A23.62.61.113
-
Remote address:8.8.8.8:53Request175.117.168.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestfp.msedge.netIN AResponsefp.msedge.netIN CNAME1.perf.msedge.net1.perf.msedge.netIN CNAMEa-0019.a-msedge.neta-0019.a-msedge.netIN CNAMEa-0019.a.dns.azurefd.neta-0019.a.dns.azurefd.netIN CNAMEa-0019.standard.a-msedge.neta-0019.standard.a-msedge.netIN A204.79.197.222
-
Remote address:8.8.8.8:53Requestarc.msn.comIN AResponsearc.msn.comIN CNAMEarc.trafficmanager.netarc.trafficmanager.netIN CNAMEiris-de-prod-azsc-v2-neu-b.northeurope.cloudapp.azure.comiris-de-prod-azsc-v2-neu-b.northeurope.cloudapp.azure.comIN A20.223.36.55
-
Remote address:8.8.8.8:53Requestwww.bing.comIN AResponsewww.bing.comIN CNAMEwww-www.bing.com.trafficmanager.netwww-www.bing.com.trafficmanager.netIN CNAMEwww.bing.com.edgekey.netwww.bing.com.edgekey.netIN CNAMEe86303.dscx.akamaiedge.nete86303.dscx.akamaiedge.netIN A23.62.61.75e86303.dscx.akamaiedge.netIN A23.62.61.121e86303.dscx.akamaiedge.netIN A23.62.61.72e86303.dscx.akamaiedge.netIN A23.62.61.97e86303.dscx.akamaiedge.netIN A23.62.61.113e86303.dscx.akamaiedge.netIN A23.62.61.194e86303.dscx.akamaiedge.netIN A23.62.61.99e86303.dscx.akamaiedge.netIN A23.62.61.129e86303.dscx.akamaiedge.netIN A23.62.61.106
-
Remote address:8.8.8.8:53Request114.66.68.104.in-addr.arpaIN PTRResponse114.66.68.104.in-addr.arpaIN PTRa104-68-66-114deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request67.112.168.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestofficeclient.microsoft.comIN AResponseofficeclient.microsoft.comIN CNAMEconfig.officeapps.live.comconfig.officeapps.live.comIN CNAMEprod.configsvc1.live.com.akadns.netprod.configsvc1.live.com.akadns.netIN CNAMEeurope.configsvc1.live.com.akadns.neteurope.configsvc1.live.com.akadns.netIN CNAMEukw-azsc-config.officeapps.live.comukw-azsc-config.officeapps.live.comIN A52.109.32.97
-
Remote address:8.8.8.8:53Requestnexusrules.officeapps.live.comIN AResponsenexusrules.officeapps.live.comIN CNAMEprod.nexusrules.live.com.akadns.netprod.nexusrules.live.com.akadns.netIN A52.111.229.43
-
Remote address:8.8.8.8:53Requestctldl.windowsupdate.comIN AResponsectldl.windowsupdate.comIN CNAMEwu-bg-shim.trafficmanager.netwu-bg-shim.trafficmanager.netIN CNAMEbg.microsoft.map.fastly.netbg.microsoft.map.fastly.netIN A199.232.210.172bg.microsoft.map.fastly.netIN A199.232.214.172
-
Remote address:8.8.8.8:53Requestlogin.live.comIN AResponselogin.live.comIN CNAMElogin.msa.msidentity.comlogin.msa.msidentity.comIN CNAMEwww.tm.lg.prod.aadmsa.trafficmanager.netwww.tm.lg.prod.aadmsa.trafficmanager.netIN CNAMEprdv4a.aadg.msidentity.comprdv4a.aadg.msidentity.comIN CNAMEwww.tm.v4.a.prd.aadg.trafficmanager.netwww.tm.v4.a.prd.aadg.trafficmanager.netIN A20.190.159.0www.tm.v4.a.prd.aadg.trafficmanager.netIN A20.190.159.23www.tm.v4.a.prd.aadg.trafficmanager.netIN A20.190.159.4www.tm.v4.a.prd.aadg.trafficmanager.netIN A40.126.31.67www.tm.v4.a.prd.aadg.trafficmanager.netIN A20.190.159.73www.tm.v4.a.prd.aadg.trafficmanager.netIN A40.126.31.69www.tm.v4.a.prd.aadg.trafficmanager.netIN A20.190.159.75www.tm.v4.a.prd.aadg.trafficmanager.netIN A20.190.159.68
-
Remote address:8.8.8.8:53Requestself.events.data.microsoft.comIN AResponseself.events.data.microsoft.comIN CNAMEself-events-data.trafficmanager.netself-events-data.trafficmanager.netIN CNAMEonedscolprdcus16.centralus.cloudapp.azure.comonedscolprdcus16.centralus.cloudapp.azure.comIN A52.182.143.213
-
Remote address:172.67.185.224:443RequestGET /?id=11541916&stepNo=1 HTTP/2.0
host: api.getpxlemal.com
sec-ch-ua: "Chromium";v="106", "Google Chrome";v="106", "Not;A=Brand";v="99"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Windows"
upgrade-insecure-requests: 1
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site: none
sec-fetch-mode: navigate
sec-fetch-user: ?1
sec-fetch-dest: document
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 200
content-type: application/octet-stream
content-length: 95
access-control-allow-origin: *
content-security-policy: default-src 'self';base-uri 'self';font-src 'self' https: data:;form-action 'self';frame-ancestors 'self';img-src 'self' data:;object-src 'none';script-src 'self';script-src-attr 'none';style-src 'self' https: 'unsafe-inline';upgrade-insecure-requests
cross-origin-opener-policy: same-origin
cross-origin-resource-policy: same-origin
origin-agent-cluster: ?1
referrer-policy: no-referrer
strict-transport-security: max-age=15552000; includeSubDomains
x-content-type-options: nosniff
x-dns-prefetch-control: off
x-download-options: noopen
x-frame-options: SAMEORIGIN
x-permitted-cross-domain-policies: none
x-xss-protection: 0
etag: W/"5f-DsY7FAN0unBKWPoMdDyzV2gzE90"
cf-cache-status: DYNAMIC
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cw%2Bwo%2B32SxUsuzgiCnQnpiSDRgHDN%2BiuCA3q8RJ1btWMgGAh46%2FrMybHWwYPuAarw5vAsVrijfPQ16kmeQZOntwoBITo8HC5MFNfcKshXwhkXpam%2BvTeSOfFl1vMhWBAt4y2Xuk%3D"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server: cloudflare
cf-ray: 871971a718e463fe-LHR
alt-svc: h3=":443"; ma=86400
-
1.9kB 6.6kB 15 15
HTTP Request
GET https://api.getpxlemal.com/?id=11541916&stepNo=1HTTP Response
200 -
21.4kB 141.1kB 136 119
-
3.2kB 7.5kB 20 14
-
68.5kB 1.7MB 1302 1255
-
1.1kB 5.2kB 15 12
-
1.1kB 5.2kB 15 12
-
1.1kB 5.2kB 15 12
-
1.1kB 5.2kB 15 12
-
1.1kB 5.2kB 15 12
-
1.7kB 7.7kB 23 18
-
3.0kB 7.5kB 24 16
-
1.1kB 3.1kB 16 16
DNS Request
api.getpxlemal.com
DNS Response
172.67.185.224104.21.48.115
DNS Request
224.185.67.172.in-addr.arpa
DNS Request
43.229.111.52.in-addr.arpa
DNS Request
ctldl.windowsupdate.com
DNS Response
2.17.197.2412.17.197.240
DNS Request
r.bing.com
DNS Response
23.62.61.9923.62.61.12923.62.61.9723.62.61.15223.62.61.5723.62.61.7223.62.61.7523.62.61.10623.62.61.113
DNS Request
175.117.168.52.in-addr.arpa
DNS Request
fp.msedge.net
DNS Response
204.79.197.222
DNS Request
arc.msn.com
DNS Response
20.223.36.55
DNS Request
www.bing.com
DNS Response
23.62.61.7523.62.61.12123.62.61.7223.62.61.9723.62.61.11323.62.61.19423.62.61.9923.62.61.12923.62.61.106
DNS Request
114.66.68.104.in-addr.arpa
DNS Request
67.112.168.52.in-addr.arpa
DNS Request
officeclient.microsoft.com
DNS Response
52.109.32.97
DNS Request
nexusrules.officeapps.live.com
DNS Response
52.111.229.43
DNS Request
ctldl.windowsupdate.com
DNS Response
199.232.210.172199.232.214.172
DNS Request
login.live.com
DNS Response
20.190.159.020.190.159.2320.190.159.440.126.31.6720.190.159.7340.126.31.6920.190.159.7520.190.159.68
DNS Request
self.events.data.microsoft.com
DNS Response
52.182.143.213
-
204 B 3
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
871B
MD553f0692be1dceda45e8ed043ed8840a9
SHA1e3686f925f5b4d52eda525934ad6280d790507ef
SHA256db7c63f2527fb2fdc2083d9b21368b2833f63874accc341c8c939a96e3a272bb
SHA512af7f7b4133b0432f60eda76d0ae6cfc232971a7055d720c84360fb130194e6ceb61389312064836ea1c756b61992882fc5b5ea44f2691a0620d9c7721777e6b5
-
Filesize
538B
MD5aa7de0e64180fb1fcd09fd4f1fd227b3
SHA12ce32bb9dd2d0691a61b94320820d237e981e2a9
SHA2565e8f31813a90df2f0e01ef4e5b057b373b8f149231927177c09f73a9de53ce6d
SHA51266a8ef96da1c848cb8b38be88f9d2510bf9fd648984b786a950ca9d6326a6d55322ed33b11513f227880534105cf46a5f2b80f7abdd66189c5217795095b53aa
-
Filesize
6KB
MD5c56452ca47e144ed8d6dd9f4951e5aad
SHA1ac3b229fadac29d338be6b296aa3e1fd993a2e84
SHA2560986c47d3ca450fbb38fd0489f14aad58fd7befca05b7de5a253258160404a35
SHA5120246183346f17b6ab56a60cab5d1cdd35f7c65f9ffb2525a24336bd13e3c0f994805d90bc0f8d085fff6ea70972d3cf84f728aafabbfcab2ffc37d362a128090
-
Filesize
6KB
MD5710ff04a286427ebe85f8a227920a1aa
SHA18c2f384ce3e28839ed9a88e7bbcb436bcb62e9f8
SHA256da746e0466c034c1dbdb29456d37055aef8552f0593254980e04f0f17b442d78
SHA512d702d228287dbaaf60fa6757cf565c9354878c87e4435c1aa925a3f7054c63db3451693f1526807191b62452b54a57efadeb531961aa522dea15ea22e907eb9d
-
Filesize
130KB
MD5092d23cc5822a84961124cd62f4495ae
SHA18ceae3a48623ed440ca24fbda43f5d29efc61342
SHA2561d00ba3370ed296fb6e3eff1f036c89e8ca6a38c9bc18c61318d8fd752e1c494
SHA5120a061819421cf928781593d71fff63c2f87ad03aa611fa016394c8a1c3d8f2c86406cc5f3ebe47198f9171e4cc07b08613cec3c109644250dd0694791f83be97
-
Filesize
98KB
MD592a46ed9c92bf780bf8d5ce98d0f63c5
SHA1195ad6bca561ab10d66f75609f073fd95b4f3238
SHA256e187598a644370472c8f723a74facdbefccaa82c877968438dd988030c284ace
SHA512b978c9909c5a827017dfe95ba336f714768f112034403c49a6d5c691372a7c703cb23ad73ce8819d7858fa5f0002b3486f2dd7a0c2eb4fbae3292c6197b98bb5
-
Filesize
93KB
MD50a0c5d3ea3c25eb2809269da5754ab0a
SHA1ca512bcaafe05694e61d699db7cf82477d10503f
SHA25693a8f4a3c783f57a39d9c1d9d321bada9069423fe8f843a84e39c0c2a9338a08
SHA512737479b1755b36fd469e4ab712582c660d7a42cc05bdc779431e58cee9baf92da57d420940fb19f2bf86cc2767cfb648820abca0fd2a5ee493057d34323bd36a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
84B
MD5ba7008d06d55882c8eacba61f536b80b
SHA17bfa9de8898fbada811028fe89e450731d9b8422
SHA25612328f1e70db2d7808ec865e5ea39f4f9aa5b9b2daed28b8e60ac8efa7d6d657
SHA51222f7e45d31b60484837f25473d7cf8419e357721e92b0df01fecff5436192ba757a88bb634e9cdfdc7d515b7a95bc275bf7e0744121b5f9dfa94c6b2c2bba682